Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Course Outline-Computer Security-Course Breakdown, Lecture notes of Computer Security

This course teaches the key concepts of computer and network security. The course is divided in two parts. The first part covers the key cryptology concepts and protocols while the second half is about the advance topics in network security. Although reasonable emphasis is laid down on programming, yet the mathematical part is heavily used in almost all the algorithms with proofs and theorems.

Typology: Lecture notes

2011/2012

Uploaded on 08/08/2012

parni
parni 🇮🇳

4.1

(14)

107 documents

1 / 5

Toggle sidebar

Related documents


Partial preview of the text

Download Course Outline-Computer Security-Course Breakdown and more Lecture notes Computer Security in PDF only on Docsity! Title Credits Semester Duration Computer Network Security 3+0 18 Weeks Course Code: Semester: Class: CC420 Fall 10 BIT9 Instructor: Email: website: Office: Extension: A-307 2217 Counseling Hours: 1400-1500 hrs, Wednesday or by appointment Teaching Assistant: Email: website: Office: Extension: Pre-requisites: Students are expected to have taken following courses and topics:  CE 320 Computer Networks Course Description: This course teaches the key concepts of computer and network security. The course is divided in two parts. The first part covers the key cryptology concepts and protocols while the second half is about the advance topics in network security. Although reasonable emphasis is laid down on programming, yet the mathematical part is heavily used in almost all the algorithms with proofs and theorems. Outcomes: After completion of the course, students are expected to have an in depth understanding of the advanced networking technologies that are employed by state-of-the-art secure networks. docsity.com Text Books: Reference Books:  Network Security Essentials, Author: William Stallings. Publisher: Prentice Hall.  Cryptography and Network Security, Author: William Stallings. Publisher: Prentice Hall.  Applied Cryptography, 2nd Edition, Author: Bruce Schneier. Publisher: John Wiley & Sons. Tentative Grading Policy:  OHTs : 30 %  Quizzes : 10%  Assignments & Lab : 5 %  Term Project : 5 %  Final Exam : 50 % Plagiarism Policy: No Plagiarism will be tolerated. Any attempt of copying code during the lab and assignment will result in a disciplinary action and zero marks in that lab/assignment to the students. Quizzes/Assignment Policy The quizzes will be a mix of announced and unannounced and the time allowed will be on the discretion of the instructor. In order to give practice and comprehensive understanding of subject, home assignments will be given, which will be scientific/term papers and programming assignments. The students are advised to do the assignment themselves. Copying of assignment is highly discouraged and taken as cheating case and will be forwarded for disciplinary action. Late assignments will not be accepted / graded. All assignments will count towards the total (No ‘best-of’ policy). Tools and Software: Platform independence for programming projects. Detailed Breakdown of Lecture (tentative) docsity.com
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved